Lucene search

K
packetstormMoritz NaumannPACKETSTORM:94516
HistoryOct 05, 2010 - 12:00 a.m.

SquirrelMail Virtual Keyboard 0.9.1 Cross Site Scripting

2010-10-0500:00:00
Moritz Naumann
packetstormsecurity.com
35
`Hi,  
  
Squirrelmail plugin 'Virtual Keyboard' version 0.9.1 and lower is  
vulnerable to cross site scripting (XSS).  
  
The vkeyboard.php script fails to sanitize the value of HTTP GET  
parameter 'passformname' which the script stores in a variable of the  
same name and outputs (unmodified) into a HTML document later. As such,  
it is possible to inject client-evaluated HTML and script code into the  
output generated by the application.  
  
For proof of concept, accessing the following location ([Base_URL]  
refers to a Squirrelmail installation with a vulnerable version of the  
'Virtual Keyboard' plugin) results in a javascript generated alert  
windows reading 'XSS' popping up:  
> [Base_URL]/plugins/vkeyboard/vkeyboard.php?passformname=%22%3E%3Cscript%3Ealert%28%27XSS%27%29;%3C/script%3E%3Cscript%3E/*%20  
  
'Virtual Keyboard' installations can be found using this 'Google dork':  
> http://google.com/search?hl=en&safe=off&filter=0&q=inurl%3A%22vkeyboard.php%22  
  
This vulnerability was originally reported in early May 2010.  
A suitable update fixing this issue, Virtual Keyboard v0.9.2 for  
Squrrelmail 1.4.x, has been provided to the Squirrelmail developers and  
me by Daniel Kobayashi Imori of Bastion Systems (the original developer  
of this plugin) in early June 2010 and is attached to this email -  
thanks Daniel. The Squirrelmail team has not yet made it to update this  
plugin in their repository:  
http://squirrelmail.org/plugin_view.php?id=159  
  
So this is the first public release I am aware of.  
  
Thanks for reading,  
  
Moritz Naumann  
--   
Naumann IT Security Consulting  
Samariterstr. 16  
10247 Berlin  
Germany  
  
`